HIT Consultant Insightful coverage of healthcare innovation
 

corporate systems

Results 51 - 56 of 56Sort Results By: Published Date | Title | Company Name
Published By: Microworld     Published Date: Dec 12, 2007
Due to its nature of open source code, Linux is fast becoming popular and is being deployed in ever increasing numbers on mail servers, corporate networks and desktops. Till recently, systems running on Linux were relatively free from virus and other threats. But with the greater penetration of Linux operating systems, virus authors have begun to target them.
Tags : 
virus, spam, linux, anti-spam, anti spam, anti virus, anti-virus, mailscan, email security, internet security, email filter, filter, filtering, blocking, white list, black list, microworld
    
Microworld
Published By: Dittman Incentive Marketing     Published Date: Sep 02, 2010
Learn how attributes of Social Media are changing corporate performance systems and re-inventing trust.
Tags : 
social behavior, employee motivation, intrinsic motivation, extrinsic motivation, rewards and recognition, incentives, wellness, peer-to-peer
    
Dittman Incentive Marketing
Published By: IBM     Published Date: Nov 14, 2014
Security is a growing concern in our increasingly connected Internet of Things. Everything that is connected is potentially subject to malicious and criminal attack. Learn how to incorporate security analysis and development techniques to build secure smarter systems.
Tags : 
security, cyber physical systems, agility, product development, security analysis, secure smarter systems
    
IBM
Published By: Cisco     Published Date: Feb 23, 2016
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners.
Tags : 
technology, manufacturing, management infrastructure
    
Cisco
Published By: VMware AirWatch     Published Date: Sep 11, 2015
One of the most common questions being asked by many customers recently is “How does AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.